共 50 条
- [21] Serverless search and authentication protocols for RFID FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
- [22] Attacks on Recent RFID Authentication Protocols Journal of Signal Processing Systems, 2015, 79 : 271 - 283
- [23] Addressing Flaws in RFID Authentication Protocols PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 216 - +
- [25] Reader Scheduling for Tag Access in RFID Systems 2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
- [26] Privacy of recent RFID authentication protocols INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
- [27] Weaknesses in Two RFID Authentication Protocols CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 162 - 172
- [29] Mutual Authentication of RFID Tag with Multiple Readers ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 357 - 361
- [30] A Study on Authentication Protocol for Secure RFID Tag THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692